CVE-2024-27628

EUVD-2024-24822
Buffer Overflow vulnerability in DCMTK v.3.6.8 allows an attacker to execute arbitrary code via the EctEnhancedCT method component.
Classic Buffer Overflow
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA-ADPADP
8.1 HIGH
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
Affected Products (NVD)
VendorProductVersion
offisdcmtk
3.6.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
dcmtk
bookworm
3.6.7-9~deb12u3
fixed
bullseye
3.6.5-1
not-affected
bullseye (security)
3.6.5-1+deb11u5
fixed
buster
not-affected
forky
3.6.9-6
fixed
sid
3.6.9-6
fixed
trixie
3.6.9-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
dcmtk
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
mantic
ignored
noble
needs-triage
oracular
ignored
plucky
needs-triage
questing
needs-triage
xenial
needs-triage